-
1
-
-
85080783692
-
-
accessed Feb-2015
-
Edit This Cookie. http://www.editthiscookie.com/. [accessed Feb-2015].
-
-
-
-
3
-
-
80053028829
-
The web origin concept
-
BARTH, A. The Web Origin Concept. IETF RFC 6454 (2011).
-
(2011)
, pp. 6454
-
-
Barth, A.1
-
4
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
BARTH, A., JACKSON, C., AND MITCHELL, J. C. Robust Defenses for Cross-Site Request Forgery. In Proceedings of the 15th CCS (2008), ACM, pp. 75–88.
-
(2008)
Proceedings of the 15th CCS
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
6
-
-
70449625210
-
Pretty-bad-proxy: An overlooked adversary in browsers’ HtTPS deployments
-
CHEN, S., MAO, Z., WANG, Y.-M., AND ZHANG, M. Pretty-Bad-Proxy: An Overlooked Adversary in Browsers’ HTTPS Deployments. In Proceedings of the 30th IEEE S&P (Oakland) (2009), IEEE, pp. 347–359.
-
(2009)
Proceedings of the 30th IEEE S&P (Oakland)
, pp. 347-359
-
-
Chen, S.1
Mao, Z.2
Wang, Y.-M.3
Zhang, M.4
-
7
-
-
85080695380
-
-
accessed Feb-2015
-
EVANS, C. Cookie Forcing. http://scarybeastsecurity.blogspot.com/2008/11/cookie-forcing.html, 2008. [accessed Feb-2015].
-
(2008)
Cookie Forcing
-
-
Evans, C.1
-
8
-
-
0003355701
-
Hypertext transfer protocol–HTTP/1.1
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MAS-INTER, L., LEACH, P., AND BERNERS-LEE, T. Hypertext Transfer Protocol–HTTP/1.1. IETF RFC 2616 (1999).
-
(1999)
IETF RFC
, pp. 2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Mas-Inter, L.5
Leach, P.6
Berners-Lee, T.7
-
9
-
-
84924334638
-
Hypertext transfer protocol (HTTP/1.1): Message syntax and routing
-
7230
-
FIELDING, R., AND RESCHKE, J. Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing. IETF RFC 7230 (2014).
-
(2014)
IETF RFC
-
-
Fielding, R.1
Reschke, J.2
-
11
-
-
85080762207
-
-
accessed Feb-2015
-
GITHUB. Yummy Cookies across Domains. https://github.com/blog/1466-yummy-cookies-across-domains, 2013. [accessed Feb-2015].
-
(2013)
Yummy Cookies across Domains
-
-
-
12
-
-
85015279794
-
-
accessed Feb-2015
-
GLUCK, Y., HARRIS, N., AND PRADO, A. BREACH: Reviving the CRIME Attack. http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030% 20seconds.pdf, 2013. [accessed Feb-2015].
-
(2013)
BREACH: Reviving the CRIME Attack
-
-
Gluck, Y.1
Harris, N.2
Prado, A.3
-
13
-
-
85080764902
-
-
accessed Feb-2015
-
GOOGLESUPPORT. Block Adult Content at Your School. https://support.google.com/websearch/answer/186669?hl=en. [accessed Feb-2015].
-
Block Adult Content at Your School
-
-
-
16
-
-
85080692990
-
-
accessed Feb-2015
-
IEBLOG. Project Spartan and the Windows 10 January Preview Build. http://blogs.msdn.com/b/ie/archive/2015/01/22/project-spartan-and-the-windows-10-januarypreview-build.aspx. [accessed Feb-2015].
-
Project Spartan and the Windows 10 January Preview Build
-
-
-
18
-
-
57349089194
-
ForcehtTPS: Protecting high-security web sites from network attacks
-
JACKSON, C., AND BARTH, A. ForceHTTPS: Protecting High-Security Web Sites from Network Attacks. In Proceedings of the 17th WWW (2008), ACM, pp. 525–534.
-
(2008)
Proceedings of the 17th WWW
, pp. 525-534
-
-
Jackson, C.1
Barth, A.2
-
20
-
-
84949424837
-
Compression and information leakage of plaintext
-
Springer
-
KELSEY, J. Compression and Information Leakage of Plaintext. In Fast Software Encryption (2002), Springer, pp. 263–276.
-
(2002)
Fast Software Encryption
, pp. 263-276
-
-
Kelsey, J.1
-
22
-
-
85180551265
-
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning
-
KRANCH, M., AND BONNEAU, J. Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. In Proceedings of the 22th NDSS (2015).
-
(2015)
Proceedings of the 22th NDSS
-
-
Kranch, M.1
Bonneau, J.2
-
25
-
-
84871391358
-
-
accessed Feb-2015
-
MOZZILA. Public Suffix List. https://publicsuffix.org/. [accessed Feb-2015].
-
Public Suffix List
-
-
-
26
-
-
85080668618
-
-
accessed Jun-2015
-
NGINX. Module ngx http core module. http://nginx.org/en/docs/http/ngx_http_core_module.html#large_ client_header_buffers. [accessed Jun-2015].
-
Module Ngx Http Core Module
-
-
-
27
-
-
0033295259
-
BrO: A system for detecting network intruders in real-time
-
PAXSON, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer networks 31, 23 (1999), 2435–2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
30
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
SINGH, K., MOSHCHUK, A., WANG, H. J., AND LEE, W. On the Incoherencies in Web Browser Access Control Policies. In Proceedings of the 31th IEEE S&P (Oakland) (2010), IEEE, pp. 463–478.
-
(2010)
Proceedings of the 31th IEEE S&P (Oakland)
, pp. 463-478
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.J.3
Lee, W.4
-
31
-
-
84992342056
-
Explicating SDKs: Uncovering assumptions underlying secure authentication and authorization
-
WANG, R., ZHOU, Y., CHEN, S., QADEER, S., EVANS, D., AND GUREVICH, Y. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. In USENIX Security (2013), pp. 399–314.
-
(2013)
USENIX Security
, pp. 399-1314
-
-
Wang, R.1
Zhou, Y.2
Chen, S.3
Qadeer, S.4
Evans, D.5
Gurevich, Y.6
-
33
-
-
79551561108
-
Why arent HTTp-only cookies more widely deployed
-
ZHOU, Y., AND EVANS, D. Why Arent HTTP-only Cookies More Widely Deployed. Proceedings of 4th W2SP 2 (2010).
-
(2010)
Proceedings of 4th W2SP
, vol.2
-
-
Zhou, Y.1
Evans, D.2
|